Alert: Microsoft Security Bulletin MS05-002 - Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: 01/11/05

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-003 - Vulnerability in the Indexing Service Could Allow Remote Code Execution (871250)"
    Date:         Tue, 11 Jan 2005 13:41:28 -0500
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Microsoft Security Bulletin MS05-002:
    Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/bulletin/MS05-002.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, January 11, 2005
    Impact of Vulnerability: Remote Code Execution
    Maximum Severity Rating: Critical
    Patch(es) Replaced: This bulletin replaces a prior security update. See the frequently asked questions (FAQ) section of this bulletin for more information.
    Caveats: None

    Tested Software:
    Affected Software:
    ------------------
    * Microsoft Windows NT Server 4.0 Service Pack 6a
    <http://tinyurl.com/43knn>
    * Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
    <http://tinyurl.com/5swfp>
    * Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
    <http://tinyurl.com/6p5bq>
    * Microsoft Windows XP Service Pack 1
    <http://tinyurl.com/5lmpx>
    * Microsoft Windows XP 64-Bit Edition Service Pack 1
    <http://tinyurl.com/4pgsw>
    * Microsoft Windows XP 64-Bit Edition Version 2003
    <http://tinyurl.com/6hsly>
    * Microsoft Windows Server 2003
    <http://tinyurl.com/4auef>
    * Microsoft Windows Server 2003 64-Bit Edition Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details about these operating systems.
    <http://tinyurl.com/6hsly>

    Technical Description:
    ----------------------
    * Cursor and Icon Format Handling Vulnerability - CAN-2004-1049: A remote code execution vulnerability exists in the way that cursor, animated cursor, and icon formats are handled. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially allow remote code execution if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

    * Windows Kernel Vulnerability - CAN-2004-1305: A denial of service vulnerability exists in the way that cursor, animated cursor, and icon formats are handled. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially cause the operating system to become unresponsive. The operating system would have to be restarted to restore functionality.

    This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1837.24459)

    Cheers,
    Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-003 - Vulnerability in the Indexing Service Could Allow Remote Code Execution (871250)"

    Relevant Pages

    • <<< Small Biz Server this week July 18th 2004 >>>
      ... discovered vulnerabilities in Microsoft Windows. ... - Microsoft Windows NT Workstation 4.0 Service Pack 6a ... - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6 ... Restart required: In some cases, this update does not require a ...
      (microsoft.public.backoffice.smallbiz2000)
    • <<< Small Biz Server this week July 18th 2004 >>>
      ... discovered vulnerabilities in Microsoft Windows. ... - Microsoft Windows NT Workstation 4.0 Service Pack 6a ... - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6 ... Restart required: In some cases, this update does not require a ...
      (microsoft.public.windows.server.sbs)
    • <<< Small Biz Server this week July 18th 2004 >>>
      ... discovered vulnerabilities in Microsoft Windows. ... - Microsoft Windows NT Workstation 4.0 Service Pack 6a ... - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6 ... Restart required: In some cases, this update does not require a ...
      (microsoft.public.backoffice.smallbiz)
    • Microsoft Security Bulletin July 2004
      ... discovered vulnerabilities in Microsoft Windows. ... - Microsoft Windows NT Workstation 4.0 Service Pack 6a ... - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack ... update will require a restart. ...
      (microsoft.public.de.security.netzwerk.sicherheit)
    • Microsoft Security Bulletin July 2004
      ... discovered vulnerabilities in Microsoft Windows. ... - Microsoft Windows NT Workstation 4.0 Service Pack 6a ... - Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack ... update will require a restart. ...
      (microsoft.public.de.security.heimanwender)